首页 > 最新文献

Int. J. Interdiscip. Telecommun. Netw.最新文献

英文 中文
Orphan Node Connected Management in Multi-Hop Clustering-Based Routing Protocols for Wireless Sensor Networks 基于多跳集群的无线传感器网络路由协议中的孤儿节点连接管理
Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100101
Wassim Jerbi, Abderrahmen Guermazi, H. Trabelsi
In distributed clustering protocols, the selection of a cluster head CH presents a major constraint to the proper functioning of the network. Generally, the process begins with a random choice of CHs at the time of cluster formation. A selective process is then used based on a probabilistic or iterative calculation in order to choose the different CHs. This approach leads to a non-uniform distribution of the different CHs. Indeed, in some cycles, the CHs may be concentrated in a part of the monitored area, some CH nodes fail to reach its neighbor CH. They are considered as isolated nodes in the network. The major contribution of this article is to propose a solution to maximize the number of nodes connected to the networks, in order to have an improved connectivity. However, the coverage of the entire monitored area can provide persistent information to WSN applications. The work in this paper resulted in the design and development of a new distributed clustering protocol called Orphan_Nodes_Connected (ONC) protocol that significantly improves the connectivity of the monitored area.
在分布式集群协议中,簇头CH的选择是网络正常运行的主要制约因素。一般来说,这一过程从星团形成时随机选择CHs开始。然后使用基于概率或迭代计算的选择过程来选择不同的CHs。这种方法导致不同CHs的分布不均匀。确实,在某些周期中,CHs可能集中在监控区域的一部分,一些CH节点无法到达相邻的CH,它们被认为是网络中的孤立节点。本文的主要贡献是提出了一种解决方案,以最大限度地增加连接到网络的节点数量,从而提高连接性。但是,整个监控区域的覆盖范围可以为WSN应用程序提供持久的信息。本文的工作导致了一种新的分布式集群协议的设计和开发,称为orphan_node_connected (ONC)协议,该协议显着提高了被监控区域的连通性。
{"title":"Orphan Node Connected Management in Multi-Hop Clustering-Based Routing Protocols for Wireless Sensor Networks","authors":"Wassim Jerbi, Abderrahmen Guermazi, H. Trabelsi","doi":"10.4018/IJITN.2019100101","DOIUrl":"https://doi.org/10.4018/IJITN.2019100101","url":null,"abstract":"In distributed clustering protocols, the selection of a cluster head CH presents a major constraint to the proper functioning of the network. Generally, the process begins with a random choice of CHs at the time of cluster formation. A selective process is then used based on a probabilistic or iterative calculation in order to choose the different CHs. This approach leads to a non-uniform distribution of the different CHs. Indeed, in some cycles, the CHs may be concentrated in a part of the monitored area, some CH nodes fail to reach its neighbor CH. They are considered as isolated nodes in the network. The major contribution of this article is to propose a solution to maximize the number of nodes connected to the networks, in order to have an improved connectivity. However, the coverage of the entire monitored area can provide persistent information to WSN applications. The work in this paper resulted in the design and development of a new distributed clustering protocol called Orphan_Nodes_Connected (ONC) protocol that significantly improves the connectivity of the monitored area.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115409032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New AOMDV Lifetime Prolonging Routing Algorithm for Ad-Hoc Networks 一种新的Ad-Hoc网络AOMDV生存期延长路由算法
Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100104
I. Baddari, M. A. Riahla, M. Mezghiche
Network lifetime is a key design metric in MANETs, it is considered as one of the most important parameters algorithms to be used in ad hoc networks. Each network node works completely independently and acts as a router for relaying communications. If some nodes die prematurely because of battery depletion, the network lifetime will be adversely affected, and the network will get disconnected. This article presents AOMDV-LP, a new AOMDV lifetime-prolonging routing algorithm for MANETs. This new algorithm helps to maximize the network lifetime by managing nodes energy, link cost and controlling the networks congestion. Simulations quantify the performance gains of the authors algorithm.
网络生存期是自组网中一个重要的设计指标,是自组网中最重要的参数算法之一。每个网络节点完全独立工作,充当中继通信的路由器。如果一些节点因为电池耗尽而过早死亡,将会对网络寿命产生不利影响,导致网络断开。本文提出了一种新的面向manet的AOMDV寿命延长路由算法AOMDV- lp。该算法通过管理节点能量、链路开销和控制网络拥塞,使网络生存时间最大化。仿真量化了作者算法的性能增益。
{"title":"A New AOMDV Lifetime Prolonging Routing Algorithm for Ad-Hoc Networks","authors":"I. Baddari, M. A. Riahla, M. Mezghiche","doi":"10.4018/IJITN.2019100104","DOIUrl":"https://doi.org/10.4018/IJITN.2019100104","url":null,"abstract":"Network lifetime is a key design metric in MANETs, it is considered as one of the most important parameters algorithms to be used in ad hoc networks. Each network node works completely independently and acts as a router for relaying communications. If some nodes die prematurely because of battery depletion, the network lifetime will be adversely affected, and the network will get disconnected. This article presents AOMDV-LP, a new AOMDV lifetime-prolonging routing algorithm for MANETs. This new algorithm helps to maximize the network lifetime by managing nodes energy, link cost and controlling the networks congestion. Simulations quantify the performance gains of the authors algorithm.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124689376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Assertion of IoT Devices Using Cloud of Things Perception 使用物联网云感知的物联网设备的安全断言
Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100102
Mamata Rath, Bibudhendu Pati
Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.
在当前技术发展的时代,物联网(IoT)和物云(CoT)的采用预计将越来越具有侵入性,使其成为未来基于互联网的通信系统的重要机制。物联网和云和物联网是两个新兴且多元化的先进领域,在当前的技术场景中呈现多样化。云计算和物联网融合在一起的模式被认为是颠覆性的,并将成为大量应用场景的推动者。由于云和物联网范式的采用,许多应用程序正在获得重要的技术关注。在未来,处理技术安全的设置将变得更加复杂。到目前为止,信息将发生严重变化,要跟上不断变化的技术将非常困难。组织将不得不在更高的支出下反复切换到新的基于技能的技术。最新的工具、方法和足够的专业知识对于控制计算机系统的威胁和漏洞至关重要。考虑到云计算和物联网在物联网新领域的集成,上述文章提供了基于云的物联网应用和物联网的最新优势,重点关注其安全性和面向应用的挑战。然后对这些挑战进行详细的综合,以对与物联网安全相关的各种问题、关注点、采用的机制及其使用物联网云的积极安全保障进行技术调查。
{"title":"Security Assertion of IoT Devices Using Cloud of Things Perception","authors":"Mamata Rath, Bibudhendu Pati","doi":"10.4018/IJITN.2019100102","DOIUrl":"https://doi.org/10.4018/IJITN.2019100102","url":null,"abstract":"Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Switching-Based and Delay-Aware Scheduling Algorithm for Cognitive Radio Networks 一种基于交换的认知无线网络延迟感知调度算法
Pub Date : 2019-07-01 DOI: 10.4018/IJITN.2019070104
O. Sweileh, Mohamed S. Hassan, H. Mir, M. H. Ismail
In this article, an opportunistic inter-frame spectrum scheduler that maximizes the throughput of cognitive radio networks over a span of multiple time-slots is proposed. An optimization problem is formulated to find the optimum inter-frame scheduler while taking into account the switching delay, the primary user (PU) activity, historical information on the PU behavior, the channel quality as well as the secondary user (SU) status. Simulation results show that the proposed inter-frame scheduler significantly improved the overall aggregate throughput and average switching delay of the cognitive radio network when compared to the values obtained when scheduling is done on a slot-by-slot basis.
在本文中,提出了一种机会主义的帧间频谱调度器,该调度器在多个时隙的跨度上最大化认知无线电网络的吞吐量。在考虑切换延迟、主用户(PU)活动、PU行为的历史信息、信道质量以及辅助用户(SU)状态的情况下,制定了一个优化问题来找到最佳帧间调度程序。仿真结果表明,该算法显著提高了认知无线网络的总吞吐量和平均交换时延。
{"title":"A Switching-Based and Delay-Aware Scheduling Algorithm for Cognitive Radio Networks","authors":"O. Sweileh, Mohamed S. Hassan, H. Mir, M. H. Ismail","doi":"10.4018/IJITN.2019070104","DOIUrl":"https://doi.org/10.4018/IJITN.2019070104","url":null,"abstract":"In this article, an opportunistic inter-frame spectrum scheduler that maximizes the throughput of cognitive radio networks over a span of multiple time-slots is proposed. An optimization problem is formulated to find the optimum inter-frame scheduler while taking into account the switching delay, the primary user (PU) activity, historical information on the PU behavior, the channel quality as well as the secondary user (SU) status. Simulation results show that the proposed inter-frame scheduler significantly improved the overall aggregate throughput and average switching delay of the cognitive radio network when compared to the values obtained when scheduling is done on a slot-by-slot basis.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114816567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating High Throughput Cipher Processing on Supercomputing Platform 在超级计算平台上加速高吞吐量密码处理
Pub Date : 2019-07-01 DOI: 10.4018/IJITN.2019070102
Hao Wang, Jingfei Jiang
The supercomputing platform is suitable for the acceleration of high throughput computing intensive applications, due to the difficulty of mathematical calculation and the communication of multi-user large data volumes, the throughput rate requirement of computing equipment in various cipher processing related applications is very high. In order to accelerate the operation of the application of high throughput cipher processing, this article proposes a coarse-grained parallel acceleration framework for MIC of supercomputing platform. The framework does not take the computing process of the algorithm into account, but achieves parallel computing by assigning the data to each computing node. The framework adopts a three-level parallel structure to accelerate the application of cipher processing, namely multi-node, multi-MIC of nodes, and multi-thread of MICs. The experimental results for a variety of cipher processing applications show that the framework applies coarse-grained parallel processing to the applications of high throughput cipher processing by supercomputing platform, and obtains the significant acceleration effect.
超级计算平台适用于加速高吞吐量计算密集型应用,由于数学计算的难度和多用户大数据量的通信,各种密码处理相关应用对计算设备的吞吐率要求非常高。为了加快高吞吐量密码处理应用的运行速度,本文提出了一种用于超级计算平台MIC的粗粒度并行加速框架。该框架不考虑算法的计算过程,而是通过将数据分配给每个计算节点来实现并行计算。该框架采用三级并行结构,即多节点、节点的多mic、mic的多线程,加速了密码处理的应用。对各种密码处理应用的实验结果表明,该框架将粗粒度并行处理应用于超级计算平台的高吞吐量密码处理应用,并获得了显著的加速效果。
{"title":"Accelerating High Throughput Cipher Processing on Supercomputing Platform","authors":"Hao Wang, Jingfei Jiang","doi":"10.4018/IJITN.2019070102","DOIUrl":"https://doi.org/10.4018/IJITN.2019070102","url":null,"abstract":"The supercomputing platform is suitable for the acceleration of high throughput computing intensive applications, due to the difficulty of mathematical calculation and the communication of multi-user large data volumes, the throughput rate requirement of computing equipment in various cipher processing related applications is very high. In order to accelerate the operation of the application of high throughput cipher processing, this article proposes a coarse-grained parallel acceleration framework for MIC of supercomputing platform. The framework does not take the computing process of the algorithm into account, but achieves parallel computing by assigning the data to each computing node. The framework adopts a three-level parallel structure to accelerate the application of cipher processing, namely multi-node, multi-MIC of nodes, and multi-thread of MICs. The experimental results for a variety of cipher processing applications show that the framework applies coarse-grained parallel processing to the applications of high throughput cipher processing by supercomputing platform, and obtains the significant acceleration effect.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors Influencing the PAPR Performance of OFDM and MIMO-OFDM Systems: A Comparison Study 影响OFDM与MIMO-OFDM系统PAPR性能的因素比较研究
Pub Date : 2019-07-01 DOI: 10.4018/IJITN.2019070103
Tahreer Mahmood, S. Mohan
Multiple-input multiple-output technology together with orthogonal frequency division multiplexing (MIMO-OFDM) is an effective technique to combat multi-channel fading and to improve bandwidth efficiency. Simultaneously, it also increases the system's ability to provide reliable transmission. However, the main disadvantage of OFDM is the high peak-to-average-power ratio (PAPR), which, if not mitigated, will negatively impact practical applications. The high PAPR increases complexity and Bit Error Rate. In this research, the authors investigate the factors influencing the PAPR performance of both OFDM and MIMO-OFDM systems. The objective of this research is to make researchers in this field become familiar with this problem as well as to impart an understanding of the factors that influence PAPR. In this study, the authors classify the factors that impact PAPR into modulation schemes and a number of sub-carriers. These parameters influence the PAPR performance have been analyzed and simulated by using MATLAB. It is observed that the numbers of sub-carriers have a great effect on the PAPR performance. However, modulation schemes can have a small effect on PAPR performance.
多输入多输出技术和正交频分复用技术(MIMO-OFDM)是对抗多信道衰落和提高带宽效率的有效技术。同时,它也增加了系统提供可靠传输的能力。然而,OFDM的主要缺点是高峰值平均功率比(PAPR),如果不加以缓解,将对实际应用产生负面影响。较高的PAPR增加了复杂度和误码率。在本研究中,作者研究了影响OFDM和MIMO-OFDM系统PAPR性能的因素。本研究的目的是使该领域的研究人员熟悉这一问题,并传授对影响PAPR的因素的理解。在本研究中,作者将影响PAPR的因素分为调制方案和若干子载波。利用MATLAB对这些参数对PAPR性能的影响进行了分析和仿真。观察到子载波的数量对PAPR性能有很大的影响。然而,调制方案对PAPR性能的影响很小。
{"title":"Factors Influencing the PAPR Performance of OFDM and MIMO-OFDM Systems: A Comparison Study","authors":"Tahreer Mahmood, S. Mohan","doi":"10.4018/IJITN.2019070103","DOIUrl":"https://doi.org/10.4018/IJITN.2019070103","url":null,"abstract":"Multiple-input multiple-output technology together with orthogonal frequency division multiplexing (MIMO-OFDM) is an effective technique to combat multi-channel fading and to improve bandwidth efficiency. Simultaneously, it also increases the system's ability to provide reliable transmission. However, the main disadvantage of OFDM is the high peak-to-average-power ratio (PAPR), which, if not mitigated, will negatively impact practical applications. The high PAPR increases complexity and Bit Error Rate. In this research, the authors investigate the factors influencing the PAPR performance of both OFDM and MIMO-OFDM systems. The objective of this research is to make researchers in this field become familiar with this problem as well as to impart an understanding of the factors that influence PAPR. In this study, the authors classify the factors that impact PAPR into modulation schemes and a number of sub-carriers. These parameters influence the PAPR performance have been analyzed and simulated by using MATLAB. It is observed that the numbers of sub-carriers have a great effect on the PAPR performance. However, modulation schemes can have a small effect on PAPR performance.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handover Algorithm to Avoid Duplication Authentication Within or Between Proxy Mobile IPv6 Domains 移动IPv6代理域内或域间避免重复认证的切换算法
Pub Date : 2019-07-01 DOI: 10.4018/IJITN.2019070101
Hewei Yu, Ziliang Li
This article proposes an enhanced handover scheme of Proxy Mobile IPv6 (PMIPv6) which can avoid duplication authentication. In traditional handover scheme, a Mobile Node (MN) needs an authentication procedure by AAA (Authentication, Authorization and Accounting) server while it enters a PMIPv6 domain. However, when an MN moves to a new subnet in the same domain, it still needs another authentication procedure, which would increase handover latency. In the proposed scheme, an MN only needs to be authenticated once while it enters a PMIPv6 domain, and a Mobile Access Gateway (MAG) that an MN is attached to will send the authentication information to the New MAG (NMAG) which MN will access to before the MN's handover. So that MN can skip the second authentication. The authors build a test-bed and have done some tests. Result shows that this scheme has got improvement in decreasing handover latency.
提出了一种改进的代理移动IPv6 (Proxy Mobile IPv6, PMIPv6)切换方案,避免了重复认证。在传统的切换方案中,移动节点(MN)在进入PMIPv6域时需要经过AAA (authentication, Authorization and Accounting)服务器的认证过程。但是,当MN移动到同一域中的新子网时,它仍然需要另一个身份验证过程,这将增加切换延迟。在该方案中,MN在进入PMIPv6域时只需要进行一次身份验证,MN所附加的移动接入网关(MAG)将在MN切换之前将身份验证信息发送给MN访问的新MAG (NMAG)。这样MN就可以跳过第二次身份验证。作者构建了一个测试平台,并进行了一些测试。结果表明,该方案在降低切换延迟方面有明显的改善。
{"title":"Handover Algorithm to Avoid Duplication Authentication Within or Between Proxy Mobile IPv6 Domains","authors":"Hewei Yu, Ziliang Li","doi":"10.4018/IJITN.2019070101","DOIUrl":"https://doi.org/10.4018/IJITN.2019070101","url":null,"abstract":"This article proposes an enhanced handover scheme of Proxy Mobile IPv6 (PMIPv6) which can avoid duplication authentication. In traditional handover scheme, a Mobile Node (MN) needs an authentication procedure by AAA (Authentication, Authorization and Accounting) server while it enters a PMIPv6 domain. However, when an MN moves to a new subnet in the same domain, it still needs another authentication procedure, which would increase handover latency. In the proposed scheme, an MN only needs to be authenticated once while it enters a PMIPv6 domain, and a Mobile Access Gateway (MAG) that an MN is attached to will send the authentication information to the New MAG (NMAG) which MN will access to before the MN's handover. So that MN can skip the second authentication. The authors build a test-bed and have done some tests. Result shows that this scheme has got improvement in decreasing handover latency.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129979866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks 车辆自组织网络中集中式TDMA调度机制的信任框架
Pub Date : 2019-04-09 DOI: 10.4018/ijitn.2020100106
Mohamed Hadded, Khalifa Toumi, A. Laouiti, P. Mühlethaler
Vehicular ad hoc networks, known as VANETs, are deployed to improve passenger comfort as well as to reduce the risk of road accidents by allowing vehicles to provide a warning in real time when a critical event is detected. In such networks, communication is possible both between the vehicles themselves and between the vehicles and the infrastructure. These applications need a reliable and secure broadcast system that takes into consideration the security issues in VANETs, the high speed of nodes, and the strict QoS requirements. For these reasons, the authors propose a trust-based and centralized TDMA-based MAC protocol that avoids time slot assignment to malicious nodes and minimizes message collision. The solution is based on the design of a generic trust mechanism for VANETs based on the MAC requirements and its integration into a centralized TDMA-based MAC protocol, named trust-CTMAC. The mechanism will permit roadside units (RSUs) to manage trust level assignment via security check during free slot allotment. The experiments carried out and the results obtained prove the effectiveness of the approach.
车辆特设网络(称为VANETs)的部署是为了提高乘客的舒适度,并通过允许车辆在检测到关键事件时提供实时警告来降低道路事故的风险。在这样的网络中,车辆之间以及车辆与基础设施之间的通信都是可能的。这些应用需要一个可靠、安全的广播系统,既要考虑vanet中的安全问题,又要考虑节点的高速度和严格的QoS要求。基于这些原因,作者提出了一种基于信任和集中式tdma的MAC协议,该协议避免了向恶意节点分配时隙并最大限度地减少了消息冲突。该方案基于基于MAC需求的vanet通用信任机制设计,并将其集成到基于tdma的集中式MAC协议trust- ctmac中。该机制将允许路边单位(rsu)在免费时段分配期间通过安全检查来管理信任级别分配。实验结果证明了该方法的有效性。
{"title":"A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks","authors":"Mohamed Hadded, Khalifa Toumi, A. Laouiti, P. Mühlethaler","doi":"10.4018/ijitn.2020100106","DOIUrl":"https://doi.org/10.4018/ijitn.2020100106","url":null,"abstract":"Vehicular ad hoc networks, known as VANETs, are deployed to improve passenger comfort as well as to reduce the risk of road accidents by allowing vehicles to provide a warning in real time when a critical event is detected. In such networks, communication is possible both between the vehicles themselves and between the vehicles and the infrastructure. These applications need a reliable and secure broadcast system that takes into consideration the security issues in VANETs, the high speed of nodes, and the strict QoS requirements. For these reasons, the authors propose a trust-based and centralized TDMA-based MAC protocol that avoids time slot assignment to malicious nodes and minimizes message collision. The solution is based on the design of a generic trust mechanism for VANETs based on the MAC requirements and its integration into a centralized TDMA-based MAC protocol, named trust-CTMAC. The mechanism will permit roadside units (RSUs) to manage trust level assignment via security check during free slot allotment. The experiments carried out and the results obtained prove the effectiveness of the approach.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129561259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling an Intrusion Detection System Based on Adaptive Immunology 基于自适应免疫学的入侵检测系统建模
Pub Date : 2019-04-01 DOI: 10.4018/IJITN.2019040104
V. Alaparthy, S. Morgera
Network security has always has been an area of priority and extensive research. Recent years have seen a considerable growth in experimenting with biologically inspired techniques. This is a consequence of the authors increased understanding of living systems and the application of that understanding to machines and software. The mounting complexity of telecommunications networks and the need for increasing levels of security have been the driving factors. The human body can act as a great role model for its unique abilities in protecting itself from external entities owing to its diverse complexities. Many abnormalities in the human body are similar to that of the attacks in wireless sensor networks (WSN). This article presents the basic ideas that can help modelling a system to counter the attacks on a WSN by monitoring parameters such as energy, frequency of data transfer, data sent and received. This is implemented by exploiting an immune concept called danger theory, which aggregates the anomalies based on the weights of the anomalous parameters. The objective is to design a cooperative intrusion detection system (IDS) based on danger theory.
网络安全一直是人们关注的重点和广泛研究的领域。近年来,以生物为灵感的技术实验有了相当大的增长。这是作者提高对生命系统的理解以及将这种理解应用于机器和软件的结果。电信网络的日益复杂和对提高安全水平的需求是驱动因素。人体由于其多样性的复杂性,在保护自身免受外部实体侵害方面具有独特的能力,因此可以作为一个很好的榜样。人体的许多异常与无线传感器网络(WSN)中的攻击相似。本文介绍了一些基本思想,这些思想可以通过监测能量、数据传输频率、发送和接收数据等参数来帮助系统建模,以对抗对WSN的攻击。这是通过利用一种称为危险理论的免疫概念来实现的,该概念基于异常参数的权重来聚合异常。目的是设计一种基于危险理论的协同入侵检测系统。
{"title":"Modeling an Intrusion Detection System Based on Adaptive Immunology","authors":"V. Alaparthy, S. Morgera","doi":"10.4018/IJITN.2019040104","DOIUrl":"https://doi.org/10.4018/IJITN.2019040104","url":null,"abstract":"Network security has always has been an area of priority and extensive research. Recent years have seen a considerable growth in experimenting with biologically inspired techniques. This is a consequence of the authors increased understanding of living systems and the application of that understanding to machines and software. The mounting complexity of telecommunications networks and the need for increasing levels of security have been the driving factors. The human body can act as a great role model for its unique abilities in protecting itself from external entities owing to its diverse complexities. Many abnormalities in the human body are similar to that of the attacks in wireless sensor networks (WSN). This article presents the basic ideas that can help modelling a system to counter the attacks on a WSN by monitoring parameters such as energy, frequency of data transfer, data sent and received. This is implemented by exploiting an immune concept called danger theory, which aggregates the anomalies based on the weights of the anomalous parameters. The objective is to design a cooperative intrusion detection system (IDS) based on danger theory.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132883070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Low Power IoT Medium Access Control for Receiver-Assigned CDMA 基于接收机分配的低功耗物联网介质接入控制
Pub Date : 2019-04-01 DOI: 10.4018/IJITN.2019040103
E. E. Petrosky, Alan J. Michaels, J. Ernst
Low power, low cost, and security-conscious wireless sensor networks are becoming increasingly pervasive in the internet of things (IoT). In these networks, receiver-assigned code division multiple access (RA-CDMA) offers benefits over existing multiple access techniques. RA-CDMA networks are asynchronous, robust against multipath interference, and offer resilience against collision. A lightweight medium access control (MAC) protocol is needed to facilitate communication in RA-CDMA networks between low power sensor nodes and access points. This article provides an overview of RA-CDMA and proposes elements of a new MAC protocol that could improve performance of certain wireless sensor networks. Key features of the proposed MAC design are introduced and compared to those of existing protocols, highlighting its simple and lightweight design. Through its compatibility with RA-CDMA, the MAC design eliminates significant overhead and complexity while meeting requirements for low power networks, which enables the implementation of dense IoT sensor networks.
低功耗、低成本和具有安全意识的无线传感器网络在物联网(IoT)中变得越来越普遍。在这些网络中,接收机分配的码分多址(RA-CDMA)比现有的多址技术更有优势。RA-CDMA网络是异步的,对多径干扰具有鲁棒性,并提供抗碰撞的弹性。在RA-CDMA网络中,需要一种轻量级的介质访问控制(MAC)协议来促进低功耗传感器节点和接入点之间的通信。本文概述了RA-CDMA,并提出了可以提高某些无线传感器网络性能的新MAC协议的元素。介绍了所提出的MAC设计的主要特点,并与现有协议进行了比较,突出了其简单轻量级的设计。通过与RA-CDMA的兼容性,MAC设计消除了显著的开销和复杂性,同时满足低功耗网络的要求,从而实现密集的物联网传感器网络。
{"title":"A Low Power IoT Medium Access Control for Receiver-Assigned CDMA","authors":"E. E. Petrosky, Alan J. Michaels, J. Ernst","doi":"10.4018/IJITN.2019040103","DOIUrl":"https://doi.org/10.4018/IJITN.2019040103","url":null,"abstract":"Low power, low cost, and security-conscious wireless sensor networks are becoming increasingly pervasive in the internet of things (IoT). In these networks, receiver-assigned code division multiple access (RA-CDMA) offers benefits over existing multiple access techniques. RA-CDMA networks are asynchronous, robust against multipath interference, and offer resilience against collision. A lightweight medium access control (MAC) protocol is needed to facilitate communication in RA-CDMA networks between low power sensor nodes and access points. This article provides an overview of RA-CDMA and proposes elements of a new MAC protocol that could improve performance of certain wireless sensor networks. Key features of the proposed MAC design are introduced and compared to those of existing protocols, highlighting its simple and lightweight design. Through its compatibility with RA-CDMA, the MAC design eliminates significant overhead and complexity while meeting requirements for low power networks, which enables the implementation of dense IoT sensor networks.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117102213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Int. J. Interdiscip. Telecommun. Netw.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1